Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.31-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.32-1
Latest_non_vulnerable_version8.0.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2fsg-vrnf-n7ff
vulnerability_id VCID-2fsg-vrnf-n7ff
summary mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21874
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15696
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15742
published_at 2026-05-15T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15654
published_at 2026-05-12T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15727
published_at 2026-05-14T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15759
published_at 2026-04-04T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-07T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15649
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15706
published_at 2026-04-09T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15673
published_at 2026-04-11T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15638
published_at 2026-04-12T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15574
published_at 2026-04-13T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.155
published_at 2026-04-16T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15508
published_at 2026-04-18T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-21T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-26T12:55:00Z
15
value 0.0005
scoring_system epss
scoring_elements 0.15543
published_at 2026-04-29T12:55:00Z
16
value 0.0005
scoring_system epss
scoring_elements 0.15414
published_at 2026-05-05T12:55:00Z
17
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-05-07T12:55:00Z
18
value 0.0005
scoring_system epss
scoring_elements 0.15636
published_at 2026-05-09T12:55:00Z
19
value 0.0005
scoring_system epss
scoring_elements 0.15614
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21874
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162281
reference_id 2162281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162281
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21874
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsg-vrnf-n7ff
1
url VCID-2pmu-2dwp-mba2
vulnerability_id VCID-2pmu-2dwp-mba2
summary mysql: Server: Replication unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21633
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21867
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21693
published_at 2026-05-15T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-24T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21553
published_at 2026-04-26T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21543
published_at 2026-04-29T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21447
published_at 2026-05-05T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21513
published_at 2026-05-07T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21599
published_at 2026-05-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21575
published_at 2026-05-11T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21671
published_at 2026-05-14T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.2192
published_at 2026-04-04T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21685
published_at 2026-04-07T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21763
published_at 2026-04-08T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2182
published_at 2026-04-09T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.2183
published_at 2026-04-11T12:55:00Z
15
value 0.00071
scoring_system epss
scoring_elements 0.21791
published_at 2026-04-12T12:55:00Z
16
value 0.00071
scoring_system epss
scoring_elements 0.21733
published_at 2026-04-13T12:55:00Z
17
value 0.00071
scoring_system epss
scoring_elements 0.21734
published_at 2026-04-16T12:55:00Z
18
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-18T12:55:00Z
19
value 0.00071
scoring_system epss
scoring_elements 0.21707
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21633
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142873
reference_id 2142873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142873
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21633
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pmu-2dwp-mba2
2
url VCID-39xf-9may-73az
vulnerability_id VCID-39xf-9may-73az
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21594
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21594
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142861
reference_id 2142861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142861
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21594
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39xf-9may-73az
3
url VCID-81qz-dkfs-wkan
vulnerability_id VCID-81qz-dkfs-wkan
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39400
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39400
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142879
reference_id 2142879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142879
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-39400
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81qz-dkfs-wkan
4
url VCID-a91v-ghah-17cp
vulnerability_id VCID-a91v-ghah-17cp
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21599
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20197
published_at 2026-04-26T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20163
published_at 2026-04-29T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20749
published_at 2026-05-15T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20512
published_at 2026-05-05T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20583
published_at 2026-05-07T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.2067
published_at 2026-05-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20645
published_at 2026-05-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20661
published_at 2026-05-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20746
published_at 2026-05-14T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.2192
published_at 2026-04-04T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21685
published_at 2026-04-07T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21763
published_at 2026-04-08T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.2182
published_at 2026-04-09T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2183
published_at 2026-04-11T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.21791
published_at 2026-04-12T12:55:00Z
15
value 0.00071
scoring_system epss
scoring_elements 0.21733
published_at 2026-04-13T12:55:00Z
16
value 0.00071
scoring_system epss
scoring_elements 0.21734
published_at 2026-04-16T12:55:00Z
17
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-18T12:55:00Z
18
value 0.00071
scoring_system epss
scoring_elements 0.21707
published_at 2026-04-21T12:55:00Z
19
value 0.00071
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-24T12:55:00Z
20
value 0.00071
scoring_system epss
scoring_elements 0.21867
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21599
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142863
reference_id 2142863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142863
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21599
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a91v-ghah-17cp
5
url VCID-aq75-zern-cfc1
vulnerability_id VCID-aq75-zern-cfc1
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21611
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06886
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.07281
published_at 2026-05-15T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.07038
published_at 2026-04-26T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06999
published_at 2026-04-29T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.07017
published_at 2026-05-05T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07164
published_at 2026-05-07T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07255
published_at 2026-05-09T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.07233
published_at 2026-05-11T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0725
published_at 2026-05-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.07279
published_at 2026-05-14T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-04T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06919
published_at 2026-04-07T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06974
published_at 2026-04-08T12:55:00Z
13
value 0.00025
scoring_system epss
scoring_elements 0.07006
published_at 2026-04-09T12:55:00Z
14
value 0.00025
scoring_system epss
scoring_elements 0.0701
published_at 2026-04-11T12:55:00Z
15
value 0.00025
scoring_system epss
scoring_elements 0.07
published_at 2026-04-12T12:55:00Z
16
value 0.00025
scoring_system epss
scoring_elements 0.06993
published_at 2026-04-13T12:55:00Z
17
value 0.00025
scoring_system epss
scoring_elements 0.06932
published_at 2026-04-16T12:55:00Z
18
value 0.00025
scoring_system epss
scoring_elements 0.06915
published_at 2026-04-18T12:55:00Z
19
value 0.00025
scoring_system epss
scoring_elements 0.07051
published_at 2026-04-21T12:55:00Z
20
value 0.00025
scoring_system epss
scoring_elements 0.07034
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21611
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142869
reference_id 2142869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142869
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21611
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aq75-zern-cfc1
6
url VCID-b243-p5y2-f3gp
vulnerability_id VCID-b243-p5y2-f3gp
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21608
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25983
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25739
published_at 2026-05-15T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25724
published_at 2026-04-26T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25677
published_at 2026-04-29T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25563
published_at 2026-05-05T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25629
published_at 2026-05-07T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25689
published_at 2026-05-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25618
published_at 2026-05-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25635
published_at 2026-05-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25713
published_at 2026-05-14T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.26025
published_at 2026-04-04T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25796
published_at 2026-04-07T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25867
published_at 2026-04-08T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-09T12:55:00Z
14
value 0.00092
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-11T12:55:00Z
15
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-12T12:55:00Z
16
value 0.00092
scoring_system epss
scoring_elements 0.25832
published_at 2026-04-13T12:55:00Z
17
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-16T12:55:00Z
18
value 0.00092
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-18T12:55:00Z
19
value 0.00092
scoring_system epss
scoring_elements 0.25787
published_at 2026-04-21T12:55:00Z
20
value 0.00092
scoring_system epss
scoring_elements 0.25732
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21608
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142868
reference_id 2142868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142868
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
11
reference_url https://usn.ubuntu.com/5696-2/
reference_id USN-5696-2
reference_type
scores
url https://usn.ubuntu.com/5696-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21608
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b243-p5y2-f3gp
7
url VCID-brdf-qg3q-7yc2
vulnerability_id VCID-brdf-qg3q-7yc2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39410
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37518
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37028
published_at 2026-05-15T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37107
published_at 2026-04-26T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.3702
published_at 2026-04-29T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.36902
published_at 2026-05-05T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.36969
published_at 2026-05-07T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.36988
published_at 2026-05-09T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.36909
published_at 2026-05-11T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.36932
published_at 2026-05-12T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.3701
published_at 2026-05-14T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37542
published_at 2026-04-04T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-07T12:55:00Z
12
value 0.00164
scoring_system epss
scoring_elements 0.37422
published_at 2026-04-08T12:55:00Z
13
value 0.00164
scoring_system epss
scoring_elements 0.37434
published_at 2026-04-09T12:55:00Z
14
value 0.00164
scoring_system epss
scoring_elements 0.37447
published_at 2026-04-11T12:55:00Z
15
value 0.00164
scoring_system epss
scoring_elements 0.37412
published_at 2026-04-12T12:55:00Z
16
value 0.00164
scoring_system epss
scoring_elements 0.37385
published_at 2026-04-13T12:55:00Z
17
value 0.00164
scoring_system epss
scoring_elements 0.37431
published_at 2026-04-16T12:55:00Z
18
value 0.00164
scoring_system epss
scoring_elements 0.37413
published_at 2026-04-18T12:55:00Z
19
value 0.00164
scoring_system epss
scoring_elements 0.37357
published_at 2026-04-21T12:55:00Z
20
value 0.00164
scoring_system epss
scoring_elements 0.37138
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39410
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142881
reference_id 2142881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142881
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-39410
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brdf-qg3q-7yc2
8
url VCID-d9d6-kt1p-17ej
vulnerability_id VCID-d9d6-kt1p-17ej
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21917
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36352
published_at 2026-04-02T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36279
published_at 2026-04-16T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36291
published_at 2026-04-09T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36296
published_at 2026-04-11T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.3626
published_at 2026-04-12T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36235
published_at 2026-04-13T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36263
published_at 2026-04-18T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36211
published_at 2026-04-21T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.3598
published_at 2026-04-24T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.35947
published_at 2026-04-26T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.35859
published_at 2026-04-29T12:55:00Z
11
value 0.00155
scoring_system epss
scoring_elements 0.35742
published_at 2026-05-05T12:55:00Z
12
value 0.00155
scoring_system epss
scoring_elements 0.36385
published_at 2026-04-04T12:55:00Z
13
value 0.00155
scoring_system epss
scoring_elements 0.36219
published_at 2026-04-07T12:55:00Z
14
value 0.00155
scoring_system epss
scoring_elements 0.36269
published_at 2026-04-08T12:55:00Z
15
value 0.0018
scoring_system epss
scoring_elements 0.39244
published_at 2026-05-15T12:55:00Z
16
value 0.0018
scoring_system epss
scoring_elements 0.3923
published_at 2026-05-09T12:55:00Z
17
value 0.0018
scoring_system epss
scoring_elements 0.39139
published_at 2026-05-11T12:55:00Z
18
value 0.0018
scoring_system epss
scoring_elements 0.39162
published_at 2026-05-12T12:55:00Z
19
value 0.0018
scoring_system epss
scoring_elements 0.39234
published_at 2026-05-14T12:55:00Z
20
value 0.0018
scoring_system epss
scoring_elements 0.39214
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21917
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188112
reference_id 2188112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188112
3
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:35Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21917
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9d6-kt1p-17ej
9
url VCID-dkss-szpz-cfdh
vulnerability_id VCID-dkss-szpz-cfdh
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21864
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26143
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25877
published_at 2026-05-15T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25775
published_at 2026-05-12T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.2585
published_at 2026-05-14T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-04T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.25955
published_at 2026-04-07T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26022
published_at 2026-04-08T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26073
published_at 2026-04-09T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26083
published_at 2026-04-11T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26038
published_at 2026-04-12T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25979
published_at 2026-04-13T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-16T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-18T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25933
published_at 2026-04-21T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-24T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-26T12:55:00Z
16
value 0.00093
scoring_system epss
scoring_elements 0.25821
published_at 2026-04-29T12:55:00Z
17
value 0.00093
scoring_system epss
scoring_elements 0.25714
published_at 2026-05-05T12:55:00Z
18
value 0.00093
scoring_system epss
scoring_elements 0.25773
published_at 2026-05-07T12:55:00Z
19
value 0.00093
scoring_system epss
scoring_elements 0.25832
published_at 2026-05-09T12:55:00Z
20
value 0.00093
scoring_system epss
scoring_elements 0.25757
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21864
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162271
reference_id 2162271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162271
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21864
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkss-szpz-cfdh
10
url VCID-huvv-nrxp-mbfq
vulnerability_id VCID-huvv-nrxp-mbfq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21625
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21625
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142871
reference_id 2142871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142871
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21625
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-huvv-nrxp-mbfq
11
url VCID-jxwh-abnr-bkew
vulnerability_id VCID-jxwh-abnr-bkew
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39408
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37518
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37028
published_at 2026-05-15T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37107
published_at 2026-04-26T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.3702
published_at 2026-04-29T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.36902
published_at 2026-05-05T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.36969
published_at 2026-05-07T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.36988
published_at 2026-05-09T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.36909
published_at 2026-05-11T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.36932
published_at 2026-05-12T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.3701
published_at 2026-05-14T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37542
published_at 2026-04-04T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-07T12:55:00Z
12
value 0.00164
scoring_system epss
scoring_elements 0.37422
published_at 2026-04-08T12:55:00Z
13
value 0.00164
scoring_system epss
scoring_elements 0.37434
published_at 2026-04-09T12:55:00Z
14
value 0.00164
scoring_system epss
scoring_elements 0.37447
published_at 2026-04-11T12:55:00Z
15
value 0.00164
scoring_system epss
scoring_elements 0.37412
published_at 2026-04-12T12:55:00Z
16
value 0.00164
scoring_system epss
scoring_elements 0.37385
published_at 2026-04-13T12:55:00Z
17
value 0.00164
scoring_system epss
scoring_elements 0.37431
published_at 2026-04-16T12:55:00Z
18
value 0.00164
scoring_system epss
scoring_elements 0.37413
published_at 2026-04-18T12:55:00Z
19
value 0.00164
scoring_system epss
scoring_elements 0.37357
published_at 2026-04-21T12:55:00Z
20
value 0.00164
scoring_system epss
scoring_elements 0.37138
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39408
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142880
reference_id 2142880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142880
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-39408
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwh-abnr-bkew
12
url VCID-kyj1-d2zy-83f5
vulnerability_id VCID-kyj1-d2zy-83f5
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21640
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21640
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142877
reference_id 2142877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142877
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21640
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyj1-d2zy-83f5
13
url VCID-r61x-fj13-v3b5
vulnerability_id VCID-r61x-fj13-v3b5
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21604
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21604
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142865
reference_id 2142865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142865
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21604
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r61x-fj13-v3b5
14
url VCID-s77u-5edq-tkec
vulnerability_id VCID-s77u-5edq-tkec
summary mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21617
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25983
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-11T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26025
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25796
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25867
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-09T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25832
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25787
published_at 2026-04-21T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25732
published_at 2026-04-24T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25724
published_at 2026-04-26T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25677
published_at 2026-04-29T12:55:00Z
14
value 0.00156
scoring_system epss
scoring_elements 0.35883
published_at 2026-05-07T12:55:00Z
15
value 0.00156
scoring_system epss
scoring_elements 0.35922
published_at 2026-05-15T12:55:00Z
16
value 0.00156
scoring_system epss
scoring_elements 0.35837
published_at 2026-05-12T12:55:00Z
17
value 0.00156
scoring_system epss
scoring_elements 0.35904
published_at 2026-05-14T12:55:00Z
18
value 0.00156
scoring_system epss
scoring_elements 0.35814
published_at 2026-05-11T12:55:00Z
19
value 0.00156
scoring_system epss
scoring_elements 0.35902
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21617
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142870
reference_id 2142870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142870
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
11
reference_url https://usn.ubuntu.com/5696-2/
reference_id USN-5696-2
reference_type
scores
url https://usn.ubuntu.com/5696-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21617
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s77u-5edq-tkec
15
url VCID-w32w-gync-fyf3
vulnerability_id VCID-w32w-gync-fyf3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21865
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26793
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26482
published_at 2026-05-15T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26362
published_at 2026-05-11T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26458
published_at 2026-05-14T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26834
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26685
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26735
published_at 2026-04-09T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-12T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26638
published_at 2026-04-13T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26645
published_at 2026-04-16T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.26617
published_at 2026-04-18T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26578
published_at 2026-04-21T12:55:00Z
14
value 0.00096
scoring_system epss
scoring_elements 0.2652
published_at 2026-04-24T12:55:00Z
15
value 0.00096
scoring_system epss
scoring_elements 0.26513
published_at 2026-04-26T12:55:00Z
16
value 0.00096
scoring_system epss
scoring_elements 0.26441
published_at 2026-04-29T12:55:00Z
17
value 0.00096
scoring_system epss
scoring_elements 0.26309
published_at 2026-05-05T12:55:00Z
18
value 0.00096
scoring_system epss
scoring_elements 0.26378
published_at 2026-05-12T12:55:00Z
19
value 0.00096
scoring_system epss
scoring_elements 0.26433
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21865
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162272
reference_id 2162272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162272
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21865
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w32w-gync-fyf3
16
url VCID-w9e8-gnnz-rugf
vulnerability_id VCID-w9e8-gnnz-rugf
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21637
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21637
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142875
reference_id 2142875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142875
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21637
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9e8-gnnz-rugf
17
url VCID-wcd1-xgsy-rkfx
vulnerability_id VCID-wcd1-xgsy-rkfx
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21912
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35539
published_at 2026-04-02T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35501
published_at 2026-04-16T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35517
published_at 2026-04-09T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35527
published_at 2026-04-11T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35483
published_at 2026-04-12T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35461
published_at 2026-04-13T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.3549
published_at 2026-04-18T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35438
published_at 2026-04-21T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35203
published_at 2026-04-24T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.3518
published_at 2026-04-26T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.351
published_at 2026-04-29T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.34979
published_at 2026-05-05T12:55:00Z
12
value 0.00149
scoring_system epss
scoring_elements 0.35564
published_at 2026-04-04T12:55:00Z
13
value 0.00149
scoring_system epss
scoring_elements 0.35447
published_at 2026-04-07T12:55:00Z
14
value 0.00149
scoring_system epss
scoring_elements 0.35493
published_at 2026-04-08T12:55:00Z
15
value 0.00174
scoring_system epss
scoring_elements 0.38399
published_at 2026-05-15T12:55:00Z
16
value 0.00174
scoring_system epss
scoring_elements 0.38381
published_at 2026-05-09T12:55:00Z
17
value 0.00174
scoring_system epss
scoring_elements 0.38292
published_at 2026-05-11T12:55:00Z
18
value 0.00174
scoring_system epss
scoring_elements 0.38318
published_at 2026-05-12T12:55:00Z
19
value 0.00174
scoring_system epss
scoring_elements 0.38392
published_at 2026-05-14T12:55:00Z
20
value 0.00174
scoring_system epss
scoring_elements 0.3837
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21912
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188110
reference_id 2188110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188110
3
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:44Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
8
reference_url https://usn.ubuntu.com/6060-2/
reference_id USN-6060-2
reference_type
scores
url https://usn.ubuntu.com/6060-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21912
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcd1-xgsy-rkfx
18
url VCID-xxqx-v9mb-audf
vulnerability_id VCID-xxqx-v9mb-audf
summary Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. While the vulnerability is in MySQL Shell, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39402
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.48705
published_at 2026-05-15T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.48687
published_at 2026-05-14T12:55:00Z
2
value 0.00254
scoring_system epss
scoring_elements 0.48655
published_at 2026-04-02T12:55:00Z
3
value 0.00254
scoring_system epss
scoring_elements 0.48677
published_at 2026-04-04T12:55:00Z
4
value 0.00254
scoring_system epss
scoring_elements 0.48629
published_at 2026-04-07T12:55:00Z
5
value 0.00254
scoring_system epss
scoring_elements 0.48683
published_at 2026-04-13T12:55:00Z
6
value 0.00254
scoring_system epss
scoring_elements 0.48679
published_at 2026-04-09T12:55:00Z
7
value 0.00254
scoring_system epss
scoring_elements 0.48697
published_at 2026-04-11T12:55:00Z
8
value 0.00254
scoring_system epss
scoring_elements 0.48671
published_at 2026-04-24T12:55:00Z
9
value 0.00254
scoring_system epss
scoring_elements 0.48732
published_at 2026-04-16T12:55:00Z
10
value 0.00254
scoring_system epss
scoring_elements 0.48728
published_at 2026-04-18T12:55:00Z
11
value 0.00254
scoring_system epss
scoring_elements 0.48686
published_at 2026-04-21T12:55:00Z
12
value 0.00254
scoring_system epss
scoring_elements 0.48681
published_at 2026-04-26T12:55:00Z
13
value 0.00254
scoring_system epss
scoring_elements 0.48631
published_at 2026-04-29T12:55:00Z
14
value 0.00254
scoring_system epss
scoring_elements 0.48547
published_at 2026-05-05T12:55:00Z
15
value 0.00254
scoring_system epss
scoring_elements 0.48609
published_at 2026-05-07T12:55:00Z
16
value 0.00254
scoring_system epss
scoring_elements 0.48635
published_at 2026-05-09T12:55:00Z
17
value 0.00254
scoring_system epss
scoring_elements 0.48581
published_at 2026-05-11T12:55:00Z
18
value 0.00254
scoring_system epss
scoring_elements 0.48611
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39402
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-39402
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxqx-v9mb-audf
19
url VCID-zsw1-uqnv-ekfy
vulnerability_id VCID-zsw1-uqnv-ekfy
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21632
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-05-15T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20967
published_at 2026-05-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-05-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-05-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21042
published_at 2026-05-14T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
16
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
17
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
18
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
19
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
20
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21632
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142872
reference_id 2142872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142872
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21632
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsw1-uqnv-ekfy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid